Manage access in S3
Access to S3 resources is regulated:
- projects — define access within an isolated group of resources;
- role model — Defines access within the account and project;
- access policy — defines the access within the bucket.
When an action request is received in S3, access is first checked against the role model. If the role model allows access, the access policy is checked, if not, access is denied.
For API or FTP access , issue keys.
Role model access
member
User with full access to all services.Unavailable access control: users, service users, user groups and federations.
billing
User with access to billing management and without access to service management.
iam_admin
User with access to user management and without access to services and billing.Cannot manage their account: change permissions, manage notifications, delete.The first user with the iam_admin
role is created by the Account Owner.
reader
A user with access to view everything he controls member
in the same access area.
object_storage:admin
User with full access to S3 management within the project. Does not have access to S3 in other projects and other products in his project . For more information, see the instructions Managing access in S3.
object_storage_user
A user with access to the S3 buckets if an access policy is configured that allows access to the buckets for that user, see the Manage Access in S3 instructions for details . The degree of access is determined by the access policy settings. Does not have access to S3 in other projects and other products in its project.
Access within the access policy
If the user's role provides access to S3, access to a particular buck depends on the availability and settings of the access policy:
- if no access policy is created, access will be allowed to all users with access within the role model except for the role
object_storage_user
; - if an access policy is created, anything not allowed by the policy rules is denied.
See the Access Policy section for more information on how the access policy works.